ISC CISSP-ISSMP Exam Questions
CISSP-ISSMP Information Systems Security Management Professional (Page 8 )

Updated On: 17-Feb-2026

Peter works as a Computer Hacking Forensic Investigator. He has been called by an organization to conduct a seminar to give necessary information related to sexual harassment within the workplace. Peter started with the definition and types of sexual harassment. He then wants to convey that it is important that records of the sexual harassment incidents should be maintained, which helps in further legal prosecution. Which of the following data should be recorded in this documentation? Each correct answer represents a complete solution. Choose all that apply.

  1. Names of the victims
  2. Location of each incident
  3. Nature of harassment
  4. Date and time of incident

Answer(s): A,B,D



Which of the following types of evidence is considered as the best evidence?

  1. A copy of the original document
  2. Information gathered through the witness's senses
  3. The original document
  4. A computer-generated record

Answer(s): C



What are the purposes of audit records on an information system? Each correct answer represents a complete solution. Choose two.

  1. Troubleshooting
  2. Investigation
  3. Upgradation
  4. Backup

Answer(s): A,B



Which of the following refers to an information security document that is used in the United States Department of Defense (DoD) to describe and accredit networks and systems?

  1. SSAA
  2. FITSAF
  3. FIPS
  4. TCSEC

Answer(s): A



Which of the following analysis provides a foundation for measuring investment of time, money and human resources required to achieve a particular outcome?

  1. Vulnerability analysis
  2. Cost-benefit analysis
  3. Gap analysis
  4. Requirement analysis

Answer(s): C






Post your Comments and Discuss ISC CISSP-ISSMP exam dumps with other Community members:

Join the CISSP-ISSMP Discussion